Interesting HIPS test- Delete Volume

Discussion in 'other anti-malware software' started by aigle, Mar 16, 2008.

Thread Status:
Not open for further replies.
  1. Tidyup

    Tidyup Registered Member

    Joined:
    Aug 6, 2007
    Posts:
    101
    It's all about risk.

    Some behaviours are benign, and are expected. Other behaviours are malicious, and should be stopped.

    The strength of a HIPS solution is it's effectiveness in categorising the risk associated these behaviours.
     
  2. hammerman

    hammerman Registered Member

    Joined:
    Jul 14, 2007
    Posts:
    283
    Location:
    UK
    Mamutu didn't detect anything in Paranoid Mode, Alert Reduction Off.

    DefenseWall didn't detect anything as expected.

    Avira AntiVir detected it as TR/Dldr.Small.got.1
     
  3. CogitoErgoSum

    CogitoErgoSum Registered Member

    Joined:
    Aug 22, 2005
    Posts:
    641
    Location:
    Cerritos, California
    For those who are interested,

    Under Vista 32 SP1, Primary Response SafeConnect v3.0.0.1443 did not detect this test.


    Peace & Gratitude,

    CogitoErgoSum
     
  4. Nebulus

    Nebulus Registered Member

    Joined:
    Jan 20, 2007
    Posts:
    1,635
    Location:
    European Union
    It seems that no matter what I'm saying mass paranoia about this so called exploit continues... :( I belive I'm wasting my time trying to convince somebody...
     
  5. grumbleduke

    grumbleduke Registered Member

    Joined:
    Aug 10, 2007
    Posts:
    11
    Location:
    Oregon
    Destructive malware frankly is tough to deal with effectively while keeping a security product usable by most mere mortals. When a person sits down and really thinks about it, the data on our machines is very, very fragile. There are safeguards to keep most people from doing something inane like `del ntldr`, but that fact remains that there are thousands, tens of thousands, maybe hundreds of thousands of user mode and kernel mode API's (microsoft and third party) that can be used to delete, munge, or tamper with the data on the spinning disks inside our computers. I'm not saying that the test involving deleting a volume isn't an issue, what I'm saying is that the problem of data integrity and change control is by definition a difficult subject.

    Cogito, thanks for the test!

    p.s., I don't want to be seen as snotty/snarky/elitist, but using an API call is not an exploit. Please do not overload the term exploit, since it means something very specific.
     
  6. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590
    Hi Nebulus

    It's not mass paranoia. What the "test" did is of no concern, but the fact it got by Sandboxie, does concern me. That is the point.

    Pete
     
  7. hammerman

    hammerman Registered Member

    Joined:
    Jul 14, 2007
    Posts:
    283
    Location:
    UK
    I was also surprised it got past DefenseWall but not past Windows LUA and OA Run Safer.
     
  8. simmikie

    simmikie Registered Member

    Joined:
    Nov 11, 2006
    Posts:
    321

    ...or Prevx2, and SafeSpace.


    Mike
     
  9. hammerman

    hammerman Registered Member

    Joined:
    Jul 14, 2007
    Posts:
    283
    Location:
    UK
    I'm afraid not.
     
  10. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,559
    Location:
    The Netherlands
    No, they are not the greatest threat, because nowadays, most malware attacks are focused on financial gain, so a destructive file infector wouldn´t help hackers at all. But yes they are quite annoying, and I´ve also read that none destructive file infectors might make a comeback. Would be cool if HIPS could stop them.

    I´m a bit surprised that it bypassed SBIE, I´ve also tested this kind of viruses, and virtualization should protect against overwriting (and modifying?) of executables. HIPS like TF and NG could only partially protect against it. Can you or CES perhaps put this malware on Rapidshare? TIA :)

    I still wonder if this POC could have been used by malware in a real life attack. Anyone?
     
  11. grumbleduke

    grumbleduke Registered Member

    Joined:
    Aug 10, 2007
    Posts:
    11
    Location:
    Oregon
  12. Nebulus

    Nebulus Registered Member

    Joined:
    Jan 20, 2007
    Posts:
    1,635
    Location:
    European Union
    What would this POC do? I mean, unmounting a drive is not something destructive in itself...

    CIH overwrites important HDD sectors and tries to overwrite flash bios. This is very different from unmounting :).
     
  13. grumbleduke

    grumbleduke Registered Member

    Joined:
    Aug 10, 2007
    Posts:
    11
    Location:
    Oregon
    sorry, i wasn't clear and the analogy was a bit strained--using legit methods to do damage to data has been around for as long as computers have been around, that's all.
     
  14. trjam

    trjam Registered Member

    Joined:
    Aug 18, 2006
    Posts:
    9,102
    Location:
    North Carolina USA
    ESS nabbed it.;)
     
  15. innerpeace

    innerpeace Registered Member

    Joined:
    Jan 15, 2007
    Posts:
    2,121
    Location:
    Mountaineer Country
    Just to be clear, you set the test file as Run Safer and ran it without Sandboxie and the test failed (it didn't delete the volume names). Then with the test file still set as Run Safer, you opened it in Sandboxie and the test worked (it deleted the volume labels). Is this correct?

    Care to do another test :D? Could you download DropMyRights and setup a shortcut that opens the file with DropMyRights and see if it works. Here's an example of the Shortcut target.

    "C:\Program Files\DropMyRights\DropMyRights.exe" "C:\Program Files\Mozilla Firefox\Firefox.exe" (substitute Firefox with the location of the file and then click the shortcut to see if the test works or not).

    Then create a shortcut that opens Sandboxie, DropMyRights and the test file.

    "C:\Program Files\Sandboxie\Start.exe" /box:DefaultBox "C:\Program Files\DropMyRights\DropMyRights.exe" "C:\Program Files\Mozilla Firefox\Firefox.exe" (Again, substitute the Firefox info with the location of the test file and substitute the DefaultBox name if yours is different and then click the shortcut to run).

    Also, in both the above shortcuts, I have the "Start In" set as this.

    "C:\Program Files\DropMyRights"

    Here are easy instructions for DropMyRights. http://cybercoyote.org/security/drop.shtml

    If you don't have the time to try this, Am I safe trying it with only Returnil protecting my System Partition?

    Thanks,
    innerpeace
     
  16. aigle

    aigle Registered Member

    Joined:
    Dec 14, 2005
    Posts:
    11,164
    Location:
    UK / Pakistan
  17. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590
    Two independent things.

    1. I could not get it to run sandboxed with Sandboxie. I am sure Tzuk will look at it when he gets back.

    2. Using OA Run Safer, no sandbox the test failed. OA protected.

    Probably won't have time to download and test against anything I don't have installed at this point. Sorry.

    Pete
     
  18. Ilya Rabinovich

    Ilya Rabinovich Developer

    Joined:
    Sep 13, 2005
    Posts:
    1,543
    It is using 100% legitimate API calls. The only problem with it is it do not restore mount status back after reboot- so, it may harm the user.

    It is the same thing...
     
  19. innerpeace

    innerpeace Registered Member

    Joined:
    Jan 15, 2007
    Posts:
    2,121
    Location:
    Mountaineer Country
    Thanks for the clarification Pete. I'm also sure that Tzuk will look into this.

    I was just curious as you know I have been saying for a while now that OA Run Safer does not show up as Deny/Owner in Process Explorer when running that Run Safer program sandboxed. That is why I use DropMyRights as it shows Deny/Owner when sandboxed.

    I may feel brave tomorrow and give it a try.
     
  20. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590
    While a tad off topic. I have tested OA's Run Safer against some of the malware played with by folks on this forum. Allowed everything and was still protected.
     
  21. aigle

    aigle Registered Member

    Joined:
    Dec 14, 2005
    Posts:
    11,164
    Location:
    UK / Pakistan
    Ok, I have exchanged a couple of mails with Brian and they are going to fix it with next update of GesWall.
     
  22. innerpeace

    innerpeace Registered Member

    Joined:
    Jan 15, 2007
    Posts:
    2,121
    Location:
    Mountaineer Country
    I created a shortcut to run DeleteVolume.exe with DropMyRights and the test failed, it didn't delete the volumes. I rebooted afterwards.

    I tried right-clicking the above shortcut and running it sandboxed with Sandboxie and my D: and E: volumes were deleted.

    I tried the file with a complete shortcut in my other post above to start Sandboxie, DropMyRights and DeleteVolume.exe and my D: and E: volumes were deleted. I think this was mainly due to the shortcut starting Sandboxie before DMR.

    FWIW, Avira wouldn't let me get close to the file, OA2 alerted to the .exe wanting to start and Returnil returned everything back to normal.

    innerpeace
     
  23. Wordward

    Wordward Former Poster

    Joined:
    Jan 12, 2007
    Posts:
    707
    Hey innerpeace how have you been? I would love to do this test on my PC as you did with DropMyRights, but I'd be afraid I'd mess my PC up and have to DropMyPants in order to get it fixed. LOL. Seriously, I saw where Avira and another AV stopped this test and I was wondering if any other ones would?
     
  24. innerpeace

    innerpeace Registered Member

    Joined:
    Jan 15, 2007
    Posts:
    2,121
    Location:
    Mountaineer Country
    LOL, I was a little hesitant myself as it was my first time attempting such a thing. As far as the Anti-Viruses go, VirusTotal had like 26 of 32 scanners detecting it and AVG was one of them. I had to disable Avira guard to run the test, plus I was using Returnil to virtualize my C: system partition. I also have a fairly recent backup.
     
  25. TerryWood

    TerryWood Registered Member

    Joined:
    Jan 14, 2006
    Posts:
    1,039
    Hi innerpeace

    If you set up the firefox/opera/ie7 icons so that when you click on them it invokes Drop My Rights THEN loads the browser sandboxed. Does it still delete drives D & E?

    You know that DMR loads first because there is a momentary flash of the black command prompt screen.

    Terry
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.